The Israel Defense Forces (IDF) has discovered Hamas has been using internet “honeypots” to lure in its soldiers and hack them.

According to The Jerusalem Post, dozens of IDF soldiers’ identities were compromised after downloading apps from unknown links, which lead to Hamas accessing sensitive army information and intelligence.

The operation — a joint effort by the IDF and Shin Bet — uncovered a “Hamas network” of operatives posing as women on social networks.

The “Operation Hunter’s Network” identified dozens of accounts on social networks, such as Facebook, which operated with false or stolen identities with the intent to extract classified information from both regular and reserve IDF soldiers, the paper reported.

The Jerusalem Post reports that the fake “women” would engage with Israeli soldiers — mostly men and some women — urging them to download applications such as Wowo Messenger, SR Chat and YeeCall Pro to get a virus on their phone, according to Military Intelligence officials.

The virus would also have access to the phone’s camera and microphone, taking pictures and recording conversations without the soldier knowing, as well as the ability to download hidden apps, which gave Hamas access to virtually all the data on those phones.

“Wherever the phone was, so was the enemy,” a senior IDF official said. He continued to say that there is “a potential of serious harm to national security, but the damage that was actually done was minor,” he said, adding that “anyone who was infected, is not infected anymore.”

Despite the Hamas Honeypots’ efforts, the damage to IDF was minimal, meaning the plot is foiled and the phones reformatted for extra security.

The military isn’t taking any chances, however, and is putting restrictions on social media use by its soldiers, telling them not to upload photos in uniform or show any signs that they are part of the IDF.